0% found this document useful (0 votes)
55 views28 pages

IoT Module 2

The document outlines the logical design of IoT systems, detailing functional blocks, communication models, and APIs. It discusses various protocols such as IEEE 802.15.4, ZigBee, Bluetooth, BLE, Wi-Fi, LoWPAN, and CoAP, highlighting their applications, benefits, and architectural features. The content serves as a comprehensive guide for understanding the protocols and technologies that enable IoT communication and functionality.

Uploaded by

bharathsekar9009
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views28 pages

IoT Module 2

The document outlines the logical design of IoT systems, detailing functional blocks, communication models, and APIs. It discusses various protocols such as IEEE 802.15.4, ZigBee, Bluetooth, BLE, Wi-Fi, LoWPAN, and CoAP, highlighting their applications, benefits, and architectural features. The content serves as a comprehensive guide for understanding the protocols and technologies that enable IoT communication and functionality.

Uploaded by

bharathsekar9009
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

DAYANANDA SAGAR

UNIVERSITY
DEPARTMENT OF COMPUTER
APPLICATIONS

INTERNET OF THINGS(IOT)-22CA2409

MODULE -2 (PROTOCOLS FOR IOT)


LOGICAL DESIGN
It is the actual design of the IoT system. It illustrates the assembling and configuration
of the components i.e. computers, sensors, and actuators.
The logical design of IoT is composed of:
1. IoT functional blocks
2. IoT communications models
3. IoT communication APIs
1. IoT functional blocks
The functional blocks of IoT systems provide sensing, identification, actuation, management, and
communication capabilities to the IoT ecosystem.
The Functional blocks of IoT are:
Device
Devices provide sensing, actuation, monitoring, and control functions to the IoT ecosystem.
Communication
Manages communication for the IoT system.
Services
Services perform the functions of device monitoring, device control, data publishing, and device
discovery.
Management
gives functions to govern the IoT system.
Security
provides security to the IoT system. It performs authentication, authorization, message and
content integrity, and data security functions.
Application
An interface where the users can control and monitor various aspects of the IoT system. It allows
the users to view the system status and analyze the processed data.
2. IoT Communication Models
The communication models of IoT are used for communicating between the system and the server. The types of IoT
communication models are
Request-Response Model
In this communication model, the client sends requests to the server and the server responds to their requests. After receiving a
request, the server decides how to respond by fetching the data, retrieving resource representation, preparing the response, and
then sending the response to the client. The request-response protocol between a client and a server is HTTP.
Publisher-Subscriber Model
Publisher-Subscriber Model
This model is made up of three entities: Publishers, Brokers, and Consumers.
Publishers- it is the source of data that sends the data to the topic.
Consumers- they subscribe to the topics.
Brokers- they accept data from publishers and send it to the consumers.
Push-Pull Model
This model is made up of data publishers, data consumers, and data queues.
Publishers- they publish the message and push it into the queue.
Consumers- they present on the other side and they pull the data out of the queue.
Queues- it helps in decoupling the messages between the producer and consumer.
Exclusive Pair
It is a bi-directional model that includes full-duplex communication between client and server. The client sends a request and the
server keeps the record of all the connections. In this model, only WebSocket-based communication API is based.
3. IoT communication API
There are two types of communication APIs –
REST-based communication APIs
REST stands for Representational State Transfer. It is a set of architectural protocols by
which you can design web services and web APIs. These web services and APIs focus
on a system’s resources and how resource states are addressed and transferred. It has
a request-response communication model. Its architectural constraints are
components, connectors, and data elements. All of them are included within a
distributed hypermedia system.
Web Socket-Based Communication APIs
Web Socket API is the bi-directional, full-duplex communication model between
clients and servers. It does not require a new connection to set up for each message
between clients and servers. After the connection is set the messages can be sent and
received continuously without any interruption. It is best for IoT Applications with low
latency or high throughput requirements
IEEE 802.15.4
▪ IEEE 802.15.4 is a wireless networking standard developed for low-power,
low-data-rate applications in Personal Area Networks (PANs) for IoT,
embedded systems, and wireless sensor networks.

▪ It is known for its low power consumption, extended battery life, mesh
networking capabilities, and cost-effectiveness.
BASIC ARCHITECTURE AND NETWORK
TOPOLOGY
▪ The IEEE 802.15.4 technology's basic architecture consists of three layers, including
the physical layer, media access control (MAC) layer, and networking layer.
▪ Mesh and star network topologies are used to connect devices.
▪ Mesh topology enables direct communication between devices without the need for a
central hub or node.
▪ star topology has all devices communicate with a central node.
▪ The technology offers versatile options for designing networks based on specific
requirements and constraints of various applications

Benefits of IEEE 802.15.4


IEEE 802.15.4 technology offers benefits such as low power consumption and extended
battery life, low cost and simple implementation, limited data transmission rate, and
limited range and interference.
ZIGBEE PROTOCOL
▪ The most widely deployed enhancement to the 802.15.4 standard is ZigBee, which
is a standard of the ZigBee Alliance.
▪ The organization maintains, supports, and develops more sophisticated protocols
for advanced applications..
▪ These enhancements include authentication with valid nodes, encryption for
security, and a data routing and forwarding capability that enables mesh
networking.
▪ The most popular use of ZigBee is wireless sensor networks using the mesh
topology.
▪ ZigBee is also available in a version that supports energy harvesting where no
battery or ac mains power is available. And, one of the key benefits of ZigBee is the
availability of pre-developed applications. These upper-layer software additions
implement specialized uses for ZigBee.
.
Physical layer: The lowest two layers i.e. the physical and the MAC (Medium Access
Control) Layer are defined by the IEEE 802.15.4 specifications. The Physical layer is
closest to the hardware and directly controls and communicates with the Zigbee radio.
The physical layer translates the data packets in the over-the-air bits for transmission
and vice-versa during the reception.
Medium Access Control layer (MAC layer): The layer is responsible for the interface
between the physical and network layer. The MAC layer is also responsible for
providing PAN ID and also network discovery through beacon requests.
▪ Channel access: Ensuring devices don't transmit at the same time and cause
collisions. Zigbee uses Carrier Sense Multiple Access with Collision Avoidance
(CSMA/CA).
▪ Addressing: Assigning unique identifiers to devices on the network.
▪ Framing: Structuring data into packets for transmission.

Network layer: This layer acts as an interface between the


MAC layer and the application layer. It is responsible for mesh
networking.
Application layer: The application layer in the Zigbee stack is the
highest protocol layer and it consists of the application support sub-layer
and Zigbee device object. It contains manufacturer-defined applications
Application of ZigBee protocol:

1.Zigbee's mesh networking and low power consumption make it ideal for
connecting and controlling numerous lights in a home or building, creating a reliable
and energy-efficient lighting system.
2. Zigbee can connect various sensors in farms, such as soil moisture sensors,
temperature sensors, and humidity sensors. This allows for remote monitoring and
control of irrigation systems, optimizing resource usage and improving crop yields.
BLUETOOTH
Bluetooth protocol is a wireless technology standard for exchanging data over
short distances (typically less than 10 meters), using short-wavelength UHF radio
waves in the industrial, scientific, and medical radio bands, from 2.400 to 2.485
GHz.
▪ It was developed to support simple wireless communication between telephones,
computers, and other devices, and has evolved to support a wide range of devices
and use cases, such as wireless audio and music streaming.
• Bluetooth is a wireless technology standard IEEE 802.15.
• Bluetooth was developed as a way to exchange data over a short range without
the need for wires and for short-range (no more than 100 meters)
communication.
• It is in a star configuration, with a single primary device that controls several
secondary devices.
• Bluetooth operates across both layers 1 (PHY) and 2 (MAC) of the OSI model.
BLUETOOTH LOW ENERGY(BLE)
Bluetooth Low Energy (BLE) is a wireless communication protocol commonly used in IoT (Internet of Things)
applications due to its low power consumption, cost-effectiveness, and suitability for short-range
communication.
1. Low Power Consumption: BLE is optimized for low-power applications, making it ideal for
battery-operated IoT devices. It allows devices to operate for extended periods without frequent battery
replacements or recharging, which is essential for IoT deployments in remote or energy-constrained
environments.
2. Short Range Communication: BLE provides short-range communication typically within a range of up to
10-100 meters. This range limitation is suitable for IoT applications where devices need to communicate
with nearby smartphones, gateways, or other BLE-enabled devices in proximity.
3. Wireless Connectivity: BLE enables wireless connectivity between IoT devices and other BLE-enabled
devices such as smartphones, tablets, and IoT gateways. This connectivity allows IoT devices to exchange
data, receive commands, and communicate with central control systems or cloud platforms.
4. Efficient Data Transfer: BLE supports efficient data transfer with low data rates, making it suitable for
transmitting small packets of data such as sensor readings, status updates, or control commands. It
employs adaptive frequency hopping and efficient packet structures to minimize energy consumption
during data transmission.
5. Profile-based Architecture: BLE uses a profile-based architecture to define specific communication
behaviors and capabilities for different types of devices and applications. Common BLE profiles include the
Generic Attribute Profile (GATT), which defines how data is organized and exchanged between devices,
and the Generic Access Profile (GAP), which manages device discovery, connection establishment, and
security.
6. Security: BLE provides built-in security features to protect data transmission and prevent unauthorized
Application of BLE protocol:
1.BLE's low power consumption is perfect for devices that need to run for extended periods
on a small battery, like fitness trackers that monitor your steps, heart rate, and sleep.
2. BLE tags can be attached to valuable assets, such as medical equipment in a hospital or
tools in a construction site, to track their location and prevent loss or theft.
WI-FI
Wi-Fi (Wireless Fidelity) is a commonly used wireless communication technology in IoT (Internet of Things)
applications due to its widespread availability, high data rates, and compatibility with existing networking
infrastructure. Here's how Wi-Fi works in IoT:
1. High-Speed Connectivity: Wi-Fi offers high-speed data transmission, making it suitable for IoT devices
that require fast and reliable communication. It enables IoT devices to connect to local networks, the
internet, and other Wi-Fi-enabled devices such as smartphones, tablets, and computers.
2. Wireless Access Points (APs): Wi-Fi networks typically consist of one or more wireless access points
(APs) that provide wireless connectivity to devices within their coverage area. APs are connected to wired
networks and act as gateways for IoT devices to access network resources and services.
3. Infrastructure Mode: In infrastructure mode, IoT devices connect to Wi-Fi networks through APs. Each
AP is typically connected to a wired network, such as a router or switch, allowing devices to communicate
with each other and access external resources like internet services or cloud platforms.
4. Security: Wi-Fi networks support various security protocols, such as WPA2 (Wi-Fi Protected Access 2) or
WPA3, to encrypt data transmissions and protect against unauthorized access. Additional security
features like device authentication, secure bootstrapping, and data encryption may also be implemented
to ensure the confidentiality and integrity of IoT communications.
5. 802.11 Standards: Wi-Fi for IoT devices typically adheres to standard Wi-Fi protocols such as IEEE
802.11a/b/g/n/ac/ax. These standards define specifications for wireless communication, including data
rates, modulation techniques, channel access mechanisms, and security protocols.
6. Range and Coverage: Wi-Fi networks offer extended coverage areas, allowing IoT devices to
communicate over relatively long distances, typically within a range of up to several hundred meters.
This range flexibility is suitable for applications where devices need to communicate over larger areas or
across multiple floors within a building.
Application of WIFI :

1.Wi-Fi's high bandwidth allows for the streaming of high-quality video from security
cameras to a monitoring device or cloud storage, ensuring clear footage for
surveillance.
2.Modern cars use Wi-Fi to connect to the internet for navigation, entertainment, and
over-the-air software updates.
LOWPAN
Low-power Wireless Personal Area Network (LoWPAN) is a network protocol designed specifically for
connecting low-power, low-data-rate IoT (Internet of Things) devices over short distances. Here's how
LoWPAN works in IoT:
1. Low Power Consumption: LoWPAN is optimized for IoT devices that operate on limited power
sources, such as batteries or energy harvesting systems. It employs power-saving techniques to
ensure long battery life and minimize energy consumption, making it suitable for deployments in
remote or resource-constrained environments.
2. Short Range Communication: LoWPAN typically operates over short distances, covering areas
ranging from a few meters to a few kilometers. This limited range is suitable for applications where
devices need to communicate within a localized area, such as smart homes, industrial facilities, or
agricultural fields.
3. Wireless Connectivity: LoWPAN provides wireless connectivity for IoT devices using various radio
frequency (RF) technologies, including IEEE 802.15.4, Bluetooth Low Energy (BLE), or proprietary
protocols. These wireless technologies enable devices to communicate with each other directly or
through intermediate devices like routers or gateways.
4. Mesh Networking: LoWPAN supports mesh networking, where IoT devices form self-organizing
networks to relay data packets between nodes. This decentralized architecture improves network
reliability, scalability, and coverage by allowing devices to communicate through multiple hops, even
in the presence of obstacles or signal interference.
5. IPv6 Support: LoWPAN uses IPv6 (Internet Protocol version 6) to assign unique addresses to IoT
devices and enable seamless integration with the internet. IPv6 addressing allows IoT devices to
communicate directly with internet services and cloud platforms, enabling remote monitoring,
management, and data analysis.
6. Application Support: LoWPAN supports various IoT applications and use cases, including smart
home automation, industrial monitoring and control, environmental sensing, healthcare monitoring,
and asset tracking. Its low-power, short-range capabilities make it suitable for a wide range of
deployments requiring wireless connectivity for IoT devices.
COAP
CoAP (Constrained Application Protocol) plays a crucial role in facilitating efficient communication between
constrained devices over constrained networks. Here's how CoAP is used in IoT:
1. Lightweight Protocol: CoAP is designed to be lightweight and efficient, making it well-suited for IoT
devices with limited resources such as memory, processing power, and battery life. Its simplicity reduces
overhead and energy consumption, making it ideal for IoT deployments.
2. RESTful Communication: CoAP follows the principles of REST (Representational State Transfer),
allowing IoT devices to interact with resources using familiar HTTP-like methods such as GET, POST, PUT,
and DELETE. This simplifies application development and integration, as developers can leverage existing
web technologies and practices.
3. UDP-based Communication: CoAP operates over the User Datagram Protocol (UDP), which is
lightweight and connectionless. UDP's simplicity reduces the overhead associated with connection setup
and teardown, making CoAP suitable for communication in low-power and lossy networks commonly found
in IoT deployments.
4. Resource-Oriented Architecture: CoAP organizes resources on IoT devices in a hierarchical manner,
similar to the web's URI (Uniform Resource Identifier) scheme. Each resource is identified by a unique URI,
allowing clients to interact with them using CoAP messages. This resource-oriented approach simplifies
device management and enables seamless integration with web-based services.
5. Observing Resources: CoAP supports the concept of observing resources, allowing clients to subscribe
to notifications for changes in resource state. This enables efficient event-driven communication between
IoT devices, reducing the need for continuous polling and conserving energy.
6. Interoperability and Integration: CoAP promotes interoperability between heterogeneous IoT devices and
networks, enabling seamless communication and integration across different vendors and technologies. It
provides a standardized protocol for exchanging data and commands, fostering collaboration and
innovation in the IoT ecosystem.
7. Security: CoAP includes built-in security features such as Datagram Transport Layer Security (DTLS) to
ensure the confidentiality, integrity, and authenticity of data exchanged between devices. This protects
against eavesdropping, tampering, and unauthorized access, ensuring the security of IoT communications.
Architecture Overview
CoAP Environment:
1. The architecture operates within a CoAP-based network where CoAP clients, servers, and IoT devices communicate efficiently.

2. CoAP Clients:
1. These are devices (such as smartphones or embedded systems) that send requests to CoAP servers to retrieve or control IoT
resources.
2. Example: A mobile app requesting temperature data from a sensor.

3. CoAP Server:
1. The CoAP server is responsible for handling requests from clients and responding with the required data.
2. It can control IoT devices like sensors, alarms, or smart home systems.
3. Example: A temperature sensor acting as a CoAP server, responding to client requests with real-time temperature data.

4. IoT Devices (End Nodes):


1. These devices include sensors, actuators, and smart appliances that communicate via CoAP.
2. Examples:
1. IoT Device (Alarm): A CoAP-based smart alarm that can be activated remotely.
2. IoT Device (Sensor): A weather station sending environmental data.

5. CoAP Proxy (REST-CoAP Gateway):


1. This proxy server allows interoperability between CoAP and HTTP-based systems.
2. Since CoAP is used in low-power devices and HTTP is common on the Internet, this gateway translates between the two protocols.
3. Example: A cloud-based weather monitoring system using HTTP to communicate with CoAP-enabled sensors.

6. Internet (REST-based Systems):


1. The architecture connects CoAP-based IoT devices to the Internet via RESTful APIs.
2. This enables integration with cloud platforms, analytics services, and mobile applications.
MQTT (MESSAGE QUEUE TELEMETRY TRANSPORT PROTOCOL)
MQTT is a simple, lightweight messaging protocol used to establish communication between multiple
devices. It is a TCP-based protocol relying on the publish-subscribe model. This communication protocol is
suitable for transmitting data between resource-constrained devices having low bandwidth and low power
requirements.

Publish-Subscribe Model: This model involves multiple clients interacting with each other, without having
any direct connection established between them. All clients communicate with other clients only via a third
party known as a Broker.
WORKING OF MQTT
Publishing: A client (e.g., a sensor) publishes a message to a specific topic.
The message contains the data (e.g., the temperature reading).
Broker Routing: The broker receives the message and checks the topic.
It then forwards the message to all clients that have subscribed to that topic (or a matching wildcard
topic).
Subscribing: Clients (e.g., a monitoring application) subscribe to topics they're interested in .They
don't need to know who is publishing the data; they just subscribe to the topic.

Imagine a smart home with multiple sensors (temperature, light, motion) and actuators (lights,
thermostat).
•Each sensor acts as an MQTT client and publishes data to specific topics (e.g., /home/temperature,
/home/light).
•The smart home hub acts as an MQTT broker, receiving and routing messages.
•A mobile app acts as an MQTT client, subscribing to relevant topics to display sensor data and
•send commands to actuators (e.g., turn on/off lights).
KEY ARCHITECTURAL
FEATURES:
• Lightweight: MQTT messages are small and efficient, minimizing bandwidth
usage.
• Asynchronous: Publishers and subscribers don't need to communicate directly.
The broker handles message routing.
• Decoupled: Publishers and subscribers are independent of each other. This allows
for flexible and scalable systems.
• Flexible Messaging: Topics provide a flexible way to organize and filter
messages. Wildcard topics allow for subscribing to multiple topics at once.
• Quality of Service (QoS): MQTT defines different QoS levels to ensure message
delivery reliability (at most once, at least once, exactly once).

QoS Level Delivery Guarantee Speed Reliability


0 At most once Fastest Lowest
1 At least once Medium Medium
2 Exactly once Slowest Highest
• Retained Messages: The broker can store the last message published on a topic,
making it available to new subscribers.
• Will Messages: A client can define a "will message" that the broker will publish if
the client unexpectedly disconnects. This can be used to notify other clients of
device failures.
M2M
▪ This is commonly known as Machine-to-machine communication.
▪ It is a concept where two or more than two machines communicate with each other
without human interaction using a wired or wireless mechanism.
▪ M2M is a technology that helps the devices to connect between devices without
using internet.
▪ M2M communications offer several applications such as security, tracking and tracing,
manufacturing and facility management.

Example:
A vending machine automatically reporting its inventory levels to a central server.
IoT M2M
Internet of Things Machine to Machine

Devices have objects that are responsible for


Some degree of intelligence is observed in this.
decision making

The connection is via Network and using various


The connection is a point to point
communication types.

Traditional protocols(DNP3: Distributed Network


Internet protocols are used such as HTTP,FTP
Protocol ,SMS etc) and communication
and Telnet
technology techniques are used

Data is shared between other applications that Data is shared with only the communicating
are used to improve the end-user experience. parties.

Internet connection is required for


Devices are not dependent on the Internet.
communication

It supports cloud communication It supports point-to-point communication.

Involves the usage of both Hardware and


Mostly hardware-based technology
Software.

A large number of devices yet scope is large. Limited Scope for devices.
SILIMARITIES OF M2M and IoT
1.Data Exchange:
Both IoT and M2M involve the exchange of data between devices or machines, enabling them to gather information, make
decisions, and respond to changes in their environment.
2. Connectivity:
Both IoT and M2M rely on various connectivity options, such as cellular networks, Wi-Fi, Bluetooth, and LPWAN, to enable
communication between devices.
3. Automation:
Both concepts aim to automate processes, reduce human intervention, and enhance efficiency. They are often used in
industrial settings for tasks like monitoring and control.
4. Remote Monitoring:
Both IoT and M2M are used for remote monitoring and management of assets, such as machinery, vehicles, or infrastructure.
This helps in improving operational efficiency and reducing maintenance costs.
5. Real-time Data:
Both IoT and M2M systems can provide real-time data, allowing for timely decision-making and rapid responses to events or
changes in the environment.
6. Industry Applications:
Both IoT and M2M find applications across various industries, including manufacturing, healthcare, agriculture, logistics, and
smart cities.
7. Sensors and Devices:
Both IoT and M2M rely on sensors and devices to collect data from the physical world. These devices are often designed to
withstand different environmental conditions.

You might also like